And the way to deal with this is some obscure ietf nanny text in some document that may or may not be read by developers? I'm sorry, but I don't find this a very
compelling way to go about fixing this kind of problem.

But if you're going to do this at all, at least instruct them that they should only try the SIP downgrade at first contact, so that you don't have to keep exposing yourself on subsequent invitations. Telling them to not do it at all is about the
worst advise because it will be ignored.

      Mike



Rai, Anupam (Anupam) wrote:
An active attacker could very well DoS the SIPS attempt making it look
like "reciever was down". Hence downgrade must never bet attempted under
such condition. There must be some explict indication, like the one
discussed here, to indicate that contact does not accept SIPS.

-Anupam

-----Original Message-----
From: Michael Thomas [mailto:[EMAIL PROTECTED] Sent: Monday, July 30, 2007 1:55 PM
To: Eric Rescorla
Cc: IETF SIP List; Rohan Mahy; Francois Audet; Paul Kyzivat; [EMAIL PROTECTED]
Subject: Re: [Sip] draft-ietf-sip-sips-05: 480 vs. 418

Eric Rescorla wrote:
At Mon, 30 Jul 2007 09:19:04 -0700,
Michael Thomas wrote:
Eric Rescorla wrote:
At Fri, 27 Jul 2007 09:39:06 -0700,
Michael Thomas wrote:
Rohan Mahy wrote:
Michael,

At issue here is what the default implementor is likely to do. With a new 4xx, the misguided but well-meaning implementor is likely to try to "helpfully" "repair" the error without
thinking
about or understanding the security context.

Using a Warning code raises the bar significantly, but still allows automata to at least log what happened.
As I said, a receiver is completely at liberty to prevent the downgrade by not accepting the downgraded request.
Unless, of course, someone is impersonating the receiver.
Given how tangled up SIPS is, I really no idea what you're talking about, or whether it's even responsive to my suggestion. Last I heard, the entire raison d'etre of SIPS was that the next hop is cryptographically identified via TLS. I'm guessing that you're not suggesting that TLS is useless against impersonation attacks.
Of course not.

The point here is that if a caller automatically downgrades
to SIP, an
active attacker can then intercept the request and accept it, regardless of the receiver's preferences.
Um, so? That's the risk that the sender takes by sending stuff in the clear. And where's the problem here anyway? The steps are: try SIPS, then try SIP. If the first succeeds, there's no attack. So it's only in some slim window of when the receiver was down, or something like that. Doesn't seem to me to be something to get all exercised about, especially when you factor in all of the other insecurities associated with SIPS.

       Mike


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol Use [EMAIL PROTECTED] for questions on current sip Use [EMAIL PROTECTED] for new developments on the application of sip



_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to